Tag Archives: hackers

As today one can buy Wall Street stock over the internet, a new form of securities fraudsters have recently been targeted by the US Securities and Exchange Commission (SEC). This new breed of fraudsters execute their conspiring schemes through the internet, beyond the conventional boundaries of corporate boardrooms. They are cybercriminals who attack and compromise computer networks of business corporations, ... Read More »

Two suspected hackers have been sent to jail for conspiring and taking a role in compromising Talk Talk Telecommunication Company back in 2015. The two cybercriminals were identified as Mathew Hanley, 23, and Connor Allsopp, 21, who are both from Staffordshire. According to the court records, the two young hackers stole personal identifiable information (PII), banking details, and credit card ... Read More »

Darknet marketplaces are growing at a rather rapid rate. These marketplaces are not only markets for illegal and illicit drugs, but they are also places where hackers are selling various hacking tools and offering hacking as a service (HaaS) for anyone who can pay the predetermined price in cryptocurrency. The black hat hacker market evolved from being merely a playground ... Read More »

Bitcoin has been launched following the global financial crisis in 2009, and is currently the most widely popular cryptocurrency in the world. During the past few years, the number of bitcoin users and the global bitcoin trading volume has all skyrocketed, with a total supply of more than 17 million bitcoins, a market cap exceeding $112 billion, and a value ... Read More »

Malicious attacks have grown at a relatively high rate during the past few years across the whole internet. To shield websites against various forms of web attacks, researchers and penetration testers utilize honeypots to collect attack information. Nevertheless, hackers can hide themselves via stepping stones (e.g. proxy servers, VPNs) or anonymous P2P networks (e.g. the Tor network). Traditional honeypots are ... Read More »

Russian darknet was pretty shaken in 2017: top marketplace RAMP was closed, Russian Silkroad merged with Hydra market, and one of the oldest drugs forums Rutor was sold to new owners. Competition between main marketplaces led to using DDoS attacks and provocations. The same tendency persists in 2018 – servers are periodically offline, several markets have exit scammed or are ... Read More »

In October 2017, a data breach hit the whole country of Malaysia which went down into history as one of the worst ever recorded in the country. Over 46 million mobile phone subscribers were affected, and their data were later exposed on the Darknet for sale. The Malaysia police have identified the brains behind that incident after a thorough investigation. ... Read More »

Federal prosecutors in an ongoing Minnesota case involving cybercrime stated that a local business, and Monticello-based technology firm was a victim of cyber-attack which was instigated by a former worker. The former worker who was also a state resident employed hackers-for-hire to sabotage the website of Monticello. According to the FBI, this case is in relation to the growing form ... Read More »

Honeypots are networks, servers or web applications purposely built to appear vulnerable, thus showing obsolete operating systems and software, open services and ports, in order to attract malign visitors and induce them to try exploiting the system. While in a preceding tutorial I explained how to build your own honeypot, here I will explain how hackers try to avoid ... Read More »

All of the major cellular service providers have been seeing an increase of attacks on customer accounts. Hackers are stealing cell phone numbers from users of Verizon, AT&T, T-Mobile, and Sprint through social engineering techniques. Once the attackers have control of a phone number they can use it to reset passwords for services like Google and social media sites. The ... Read More »

Online phishing schemes are nothing new. They’ve been around for many years now and start with an email to home buyers about wiring a final payment; then scammers intercept and take it all. A D.C couple Sean Smith and Erin Wrona who were hopeful they were going to purchase a home but fell victim to a scam. They wired their ... Read More »

Chinese researchers unveiled a new mobile phone hacking technique they have created during a talk at this year’s Black Hat hacker conference in Las Vegas, Nevada. The researchers are from Qihoo 360’s Unicorn Team. The Unicorn Team specializes in hacking radio and cellular technology. On Thursday, July 27th, the Unicorn Team delivered a presentation at Black Hat on their new ... Read More »

Since 2006, security researchers have been watching a new technique used in cybercrime to hide malicious traffic behind an intricate network of proxies. This technique called fast-flux, was initially used by few people but lead to thousands of personal computers infected and criminal content like phishing sites and malwares successfully delivered to innocent users. Fast-flux networks are today the ... Read More »

Peter W. Smith, according to the Chicago Tribune, took his own life 10 days after contacting the Wall Street Journal. Smith told the Journal that he had found five groups of hackers on the darknet that had a copy of all 33,000 of Hillary Clinton’s deleted/stolen emails. He then died. The 81-year-old’s death was shrouded in mystery and the ... Read More »

Hackers Demand Over $250,000 for Ransomware Decryption Keys The alleged authors of the NotPetya ransomware, which swept through Ukraine locking the systems of governments, financial institutes and businesses, demanded a payment of 100 BTC, which was over $250,000 at the time, for the private keys. Earlier this week, Motherboard reported that cyber security researchers detected movement around the BTC wallet ... Read More »